<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <atom:link href="https://www.zerodayinitiative.com/rss/published/" rel="self" type="application/xml" />
    <title><![CDATA[ZDI: Published Advisories]]></title>
    <link>http://www.zerodayinitiative.com/advisories/published/</link>
    <description><![CDATA[The following is a list of publicly disclosed vulnerabilities discovered by
                   Zero Day Initiative researchers. While the affected vendor is working on a patch for these
                   vulnerabilities, TrendAI customers are protected from exploitation by security filters
                   delivered ahead of public disclosure. All security vulnerabilities that are acquired by the
                   Zero Day Initiative are handled according to the ZDI Disclosure Policy.
        ]]></description>
    <pubDate>Sat, 23 May 2026 12:30:21 -0500</pubDate>
    <copyright>Trend Micro, all rights reserved</copyright>
    <language>en</language>
    
    <item>
      <title><![CDATA[ZDI-24-1741: WSO2 API Manager SynapseArtifactUploaderAdmin Unrestricted File Upload Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-26065</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1741/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of WSO2 API Manager. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-7074.]]></description>
      <pubDate>Mon, 30 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1740: WSO2 API Manager Exposed Dangerous Function Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-23650</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1740/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass authentication on affected installations of WSO2 API Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.1. The following CVEs are assigned: CVE-2024-6914.]]></description>
      <pubDate>Mon, 30 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1739: Foxit PDF Reader Link Following Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25408</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1739/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Foxit PDF Reader. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.7. The following CVEs are assigned: CVE-2024-12753.]]></description>
      <pubDate>Mon, 30 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1738: Foxit PDF Reader AcroForm Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25345</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1738/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12752.]]></description>
      <pubDate>Mon, 30 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1737: Foxit PDF Reader AcroForm Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25344</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1737/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12751.]]></description>
      <pubDate>Mon, 30 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1736: (0Day) Paessler PRTG Network Monitor SNMP Cross-Site Scripting Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-23371</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1736/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Paessler PRTG Network Monitor. Some user interaction on the part of an administrator is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.0. The following CVEs are assigned: CVE-2024-12833.]]></description>
      <pubDate>Mon, 30 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1735: (0Day) Ashlar-Vellum Graphite VC6 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24977</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1735/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Graphite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-13051.]]></description>
      <pubDate>Mon, 30 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1734: (0Day) Ashlar-Vellum Graphite VC6 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24976</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1734/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Graphite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-13050.]]></description>
      <pubDate>Mon, 30 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1733: (0Day) Ashlar-Vellum Cobalt XE File Parsing Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24847</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1733/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-13049.]]></description>
      <pubDate>Mon, 30 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1732: (0Day) Ashlar-Vellum Cobalt XE File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24844</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1732/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-13048.]]></description>
      <pubDate>Mon, 30 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1731: (0Day) Ashlar-Vellum Cobalt CO File Parsing Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24843</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1731/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-13047.]]></description>
      <pubDate>Mon, 30 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1730: (0Day) Ashlar-Vellum Cobalt CO File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24867</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1730/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-13046.]]></description>
      <pubDate>Mon, 30 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1729: (0Day) Ashlar-Vellum Cobalt AR File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24848</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1729/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-13045.]]></description>
      <pubDate>Mon, 30 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1728: (0Day) Ashlar-Vellum Cobalt AR File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24870</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1728/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-13044.]]></description>
      <pubDate>Mon, 30 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1727: (0Day) Panda Security Dome Link Following Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-23478</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1727/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Panda Security Dome. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-13043.]]></description>
      <pubDate>Mon, 30 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1726: Linux Kernel ksmbd TCP Connection Memory Exhaustion Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25738</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1726/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of the Linux Kernel. Authentication is not required to exploit this vulnerability. However, only systems with ksmbd enabled are vulnerable. The ZDI has assigned a CVSS rating of 5.9. The following CVEs are assigned: CVE-2024-50285.]]></description>
      <pubDate>Fri, 20 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1725: Webmin CGI Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22346</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1725/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Webmin. Authentication is required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.9. The following CVEs are assigned: CVE-2024-12828.]]></description>
      <pubDate>Fri, 20 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1724: (0Day) Delta Electronics DRASimuCAD STP File Parsing Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22450</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1724/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DRASimuCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12836.]]></description>
      <pubDate>Fri, 20 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1723: (0Day) Delta Electronics DRASimuCAD ICS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22415</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1723/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DRASimuCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12835.]]></description>
      <pubDate>Fri, 20 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1722: (0Day) Delta Electronics DRASimuCAD STP File Parsing Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22414</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1722/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DRASimuCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12834.]]></description>
      <pubDate>Fri, 20 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1721: Delta Electronics DTM Soft BIN File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22331</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1721/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DTM Soft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12677.]]></description>
      <pubDate>Fri, 20 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1720: (0Day) Arista NG Firewall uvm_login Incorrect Authorization Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24324</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1720/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Arista NG Firewall. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.6. The following CVEs are assigned: CVE-2024-12831.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1719: (0Day) Arista NG Firewall ReportEntry SQL Injection Arbitrary File Read and Write Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24325</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1719/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create arbitrary files and disclose sensitive information on affected installations of Arista NG Firewall. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.3. The following CVEs are assigned: CVE-2024-12832.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1718: (0Day) Arista NG Firewall custom_handler Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24019</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1718/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.1. The following CVEs are assigned: CVE-2024-12830.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1717: (0Day) Arista NG Firewall ExecManagerImpl Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24015</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1717/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-12829.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1716: Rockwell Automation Arena Simulation DOE File Parsing Uninitialized Variable Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24545</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1716/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Arena Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11364.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1715: Rockwell Automation Arena Simulation DOE File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24539</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1715/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Arena Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11157.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1714: Rockwell Automation Arena Simulation DOE File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24158</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1714/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Arena Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12175.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1713: (0Day) Rockwell Automation Arena Simulation DOE File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24614</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1713/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Arena Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11364.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1712: Tibbo Aggregate Network Manager UploaderTempFileController Unrestricted File Upload Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24941</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1712/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tibbo Aggregate Network Manager. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2024-12700.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1711: AnyDesk Link Following Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-23940</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1711/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of AnyDesk. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.5. The following CVEs are assigned: CVE-2024-12754.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1710: Autodesk Navisworks Freedom DWFX File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25850</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1710/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Navisworks Freedom. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12200.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1709: Autodesk Navisworks Freedom DWFX File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25881</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1709/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Navisworks Freedom. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12198.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1708: Autodesk Navisworks Freedom DWFX File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25880</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1708/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Navisworks Freedom. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12197.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1707: Autodesk Navisworks Freedom DWFX File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25878</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1707/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Navisworks Freedom. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12179.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1706: Autodesk Navisworks Freedom DWFX File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25879</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1706/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Navisworks Freedom. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12194.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1705: Autodesk Navisworks Freedom DWF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25868</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1705/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Navisworks Freedom. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12192.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1704: Autodesk Navisworks Freedom DWFX File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25867</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1704/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Navisworks Freedom. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12191.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1703: Autodesk Navisworks Freedom DWFX File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25866</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1703/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Navisworks Freedom. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12178.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1702: Autodesk Navisworks Freedom DWFX File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25967</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1702/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Navisworks Freedom. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12671.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1701: Autodesk Navisworks Freedom DWF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25965</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1701/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Navisworks Freedom. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12670.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1700: Autodesk Navisworks Freedom DWFX File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25966</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1700/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Navisworks Freedom. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12669.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1699: Autodesk Navisworks Freedom DWFX File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25691</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1699/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Navisworks Freedom. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11422.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1698: libarchive run_filters Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-23999</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1698/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of libarchive. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-26256.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1697: XWiki.org XWiki SolrSearchMacros text Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-23994</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1697/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of XWiki.org XWiki. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2025-24893.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1696: libarchive RAR File Parsing Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-23729</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1696/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of libarchive. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-20697.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1695: Ivanti Avalanche FileStoreConfig Unrestricted File Upload Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24375</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1695/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ivanti Avalanche. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-37373.]]></description>
      <pubDate>Tue, 17 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1694: Microsoft PC Manager MSPCManagerService Link Following Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25733</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1694/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft PC Manager. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Tue, 17 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1693: Dell Avamar Web Restore Login Action SQL Injection Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25066</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1693/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Dell Avamar. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.2. The following CVEs are assigned: CVE-2024-47484.]]></description>
      <pubDate>Mon, 16 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1692: Dell Avamar Fitness Analyzer API SQL Injection Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25068</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1692/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Dell Avamar. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.1. The following CVEs are assigned: CVE-2024-47977.]]></description>
      <pubDate>Mon, 16 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1691: Dell Avamar Fitness Analyzer API SQL Injection Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25067</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1691/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Dell Avamar. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.1. The following CVEs are assigned: CVE-2024-52538.]]></description>
      <pubDate>Mon, 16 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1690: Dell Avamar Fitness Analyzer API SQL Injection Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25065</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1690/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Dell Avamar. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.1. The following CVEs are assigned: CVE-2024-47977.]]></description>
      <pubDate>Mon, 16 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1689: Dell Avamar Fitness Analyzer API SQL Injection Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25064</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1689/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Dell Avamar. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.1. The following CVEs are assigned: CVE-2024-47977.]]></description>
      <pubDate>Mon, 16 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1688: Linux Kernel ksmbd PreviousSessionId Race Condition Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25040</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1688/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Kernel. Authentication is required to exploit this vulnerability. However, only systems with ksmbd enabled are vulnerable. The ZDI has assigned a CVSS rating of 8.5.]]></description>
      <pubDate>Thu, 12 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1687: Progress Software WhatsUp Gold GetFilterCriteria SQL Injection Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24647</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1687/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of Progress Software WhatsUp Gold. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2024-46908.]]></description>
      <pubDate>Thu, 12 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1686: Progress Software WhatsUp Gold GetFilterCriteria SQL Injection Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24644</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1686/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of Progress Software WhatsUp Gold. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2024-46907.]]></description>
      <pubDate>Thu, 12 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1685: Progress Software WhatsUp Gold GetOrderByClause SQL Injection Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24634</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1685/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of Progress Software WhatsUp Gold. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2024-46905.]]></description>
      <pubDate>Thu, 12 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1684: Progress Software WhatsUp Gold GetSqlWhereClause SQL Injection Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24638</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1684/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of Progress Software WhatsUp Gold. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2024-46906.]]></description>
      <pubDate>Thu, 12 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1683: Wacom Center WTabletServicePro Link Following Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25359</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1683/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Wacom Center. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2024-12552.]]></description>
      <pubDate>Thu, 12 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1682: GeoVision GV-ASManager Missing Authorization Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25394</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1682/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of GeoVision GV-ASManager. Although authentication is required to exploit this vulnerability, default guest credentials may be used. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2024-12553.]]></description>
      <pubDate>Thu, 12 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1681: Tungsten Automation Power PDF JPF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25560</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1681/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12547.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1680: Tungsten Automation Power PDF JP2 File Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25564</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1680/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2024-12548.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1679: Tungsten Automation Power PDF JP2 File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25565</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1679/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12549.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1678: Tungsten Automation Power PDF JP2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25566</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1678/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2024-12550.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1677: Tungsten Automation Power PDF JP2 File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25567</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1677/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12551.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1676: ManageEngine Analytics Plus getOAToken Exposed Dangerous Method Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25135</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1676/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of ManageEngine Analytics Plus. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2024-52323.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1675: AutomationDirect C-More EA9 EAP9 File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24774</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1675/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of AutomationDirect C-More EA9. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11611.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1674: AutomationDirect C-More EA9 EAP9 File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24773</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1674/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of AutomationDirect C-More EA9. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11610.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1673: AutomationDirect C-More EA9 EAP9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24772</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1673/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of AutomationDirect C-More EA9. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11609.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1672: GFI Archiver Store Service Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24331</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1672/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2024-11949.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1671: GFI Archiver Telerik Web UI Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24041</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1671/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2024-11948.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1670: GFI Archiver Core Service Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24029</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1670/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2024-11947.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1669: Veritas Enterprise Vault MonitoringMiddleTier Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24334</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1669/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Veritas Enterprise Vault. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.0. The following CVEs are assigned: CVE-2024-53909.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1668: Veritas Enterprise Vault Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24336</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1668/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Veritas Enterprise Vault. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.0. The following CVEs are assigned: CVE-2024-53910.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1667: Veritas Enterprise Vault Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24339</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1667/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Veritas Enterprise Vault. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.0. The following CVEs are assigned: CVE-2024-53911.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1666: Veritas Enterprise Vault Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24343</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1666/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Veritas Enterprise Vault. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.0. The following CVEs are assigned: CVE-2024-53913.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1665: Veritas Enterprise Vault Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24344</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1665/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Veritas Enterprise Vault. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.0. The following CVEs are assigned: CVE-2024-53914.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1664: Veritas Enterprise Vault Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24341</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1664/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Veritas Enterprise Vault. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.0. The following CVEs are assigned: CVE-2024-53912.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1663: Veritas Enterprise Vault Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24405</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1663/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Veritas Enterprise Vault. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.0. The following CVEs are assigned: CVE-2024-53915.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1662: Veritas Enterprise Vault MobileHTMLView Cross-Site Scripting Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24695</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1662/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute web requests with the target user&#x27;s privileges on affected installations of Veritas Enterprise Vault. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.3. The following CVEs are assigned: CVE-2024-52941.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1661: Veritas Enterprise Vault HTMLView Cross-Site Scripting Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24696</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1661/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute web requests with the target user&#x27;s privileges on affected installations of Veritas Enterprise Vault. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.3. The following CVEs are assigned: CVE-2024-52942.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1660: Veritas Enterprise Vault HTMLView Cross-Site Scripting Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24697</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1660/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute web requests with the target user&#x27;s privileges on affected installations of Veritas Enterprise Vault. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.3. The following CVEs are assigned: CVE-2024-52943.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1659: Veritas Enterprise Vault HTMLView Cross-Site Scripting Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24698</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1659/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute web requests with the target user&#x27;s privileges on affected installations of Veritas Enterprise Vault. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.3. The following CVEs are assigned: CVE-2024-52944.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1658: Microsoft Edge File Extension Spoofing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25361</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1658/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Edge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2024-49041.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1657: Microsoft Windows Directory Traversal Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24583</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1657/</link>
      <description><![CDATA[This vulnerability allows remote attackers to delete arbitrary files or disclose sensitive information on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2024-49082.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1656: Delta Electronics CNCSoft-G2 DPAX File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25292</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1656/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics CNCSoft-G2. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-47964.]]></description>
      <pubDate>Wed, 11 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1655: Rockwell Automation Arena Simulation DOE File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24540</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1655/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Arena Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11156.]]></description>
      <pubDate>Tue, 10 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1654: Rockwell Automation Arena Simulation DOE File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24139</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1654/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Arena Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11156.]]></description>
      <pubDate>Tue, 10 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1653: Rockwell Automation Arena Simulation DOE File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24544</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1653/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Arena Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11155.]]></description>
      <pubDate>Tue, 10 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1652: Rockwell Automation Arena Simulation DOE File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24542</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1652/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Arena Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11156.]]></description>
      <pubDate>Tue, 10 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1651: Rockwell Automation Arena Simulation DOE File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24541</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1651/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Arena Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12130.]]></description>
      <pubDate>Tue, 10 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1650: Rockwell Automation Arena Simulation DOE File Parsing Use of Uninitialized Variable Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24137</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1650/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Arena Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11158.]]></description>
      <pubDate>Tue, 10 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1649: Rockwell Automation Arena Simulation DOE File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24115</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1649/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Arena Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11156.]]></description>
      <pubDate>Tue, 10 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1648: Linux Kernel Bluetooth HCI Request Race Condition Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24547</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1648/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Tue, 10 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1647: BlueZ Classic HID Missing Authentication Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25398</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1647/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2024-8805.]]></description>
      <pubDate>Tue, 10 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1646: Epic Games Launcher Incorrect Default Permissions Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24329</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1646/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Epic Games Launcher. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11872.]]></description>
      <pubDate>Wed, 04 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1645: Progress Software WhatsUp Gold WriteDataFile Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24975</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1645/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Progress Software WhatsUp Gold. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2024-46909.]]></description>
      <pubDate>Fri, 06 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1644: (Pwn2Own) iXsystems TrueNAS CORE fetch_plugin_packagesites tar Cleartext Transmission of Sensitive Information Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25668</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1644/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to tamper with firmware update files on affected installations of iXsystems TrueNAS devices. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 3.1. The following CVEs are assigned: CVE-2024-11946.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1643: (Pwn2Own) iXsystems TrueNAS CORE tarfile.extractall Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25626</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1643/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of iXsystems TrueNAS devices. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2024-11944.]]></description>
      <pubDate>Thu, 19 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1642: Linux Kernel nftables Type Confusion Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24348</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1642/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 3.8. The following CVEs are assigned: CVE-2024-42070.]]></description>
      <pubDate>Tue, 03 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1641: Intel Computing Improvement Program PyInstaller Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21847</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1641/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Intel Computing Improvement Program. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-49797.]]></description>
      <pubDate>Tue, 03 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1640: XnSoft XnView Classic RWZ File Parsing Integer Underflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22913</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1640/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of XnSoft XnView Classic. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11950.]]></description>
      <pubDate>Mon, 02 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1639: Hewlett Packard Enterprise Insight Remote Support processAtatchmentDataStream Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25161</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1639/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hewlett Packard Enterprise Insight Remote Support. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2024-53676.]]></description>
      <pubDate>Mon, 02 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1638: Hewlett Packard Enterprise Insight Remote Support validateAgainstXSD XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24814</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1638/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Hewlett Packard Enterprise Insight Remote Support. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.3. The following CVEs are assigned: CVE-2024-53675.]]></description>
      <pubDate>Mon, 02 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1637: Hewlett Packard Enterprise Insight Remote Support getDocumentRootElement XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24813</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1637/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Hewlett Packard Enterprise Insight Remote Support. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.3. The following CVEs are assigned: CVE-2024-53674.]]></description>
      <pubDate>Mon, 02 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1636: Hewlett Packard Enterprise Insight Remote Support DESTA Service Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24812</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1636/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hewlett Packard Enterprise Insight Remote Support. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.1. The following CVEs are assigned: CVE-2024-53673.]]></description>
      <pubDate>Mon, 02 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1635: Hewlett Packard Enterprise Insight Remote Support setInputStream XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24811</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1635/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Hewlett Packard Enterprise Insight Remote Support. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.3. The following CVEs are assigned: CVE-2024-11622.]]></description>
      <pubDate>Mon, 02 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1634: Hewlett Packard Enterprise AutoPass License Server XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24694</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1634/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Hewlett Packard Enterprise AutoPass License Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2024-51770.]]></description>
      <pubDate>Mon, 02 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1633: Hewlett Packard Enterprise AutoPass License Server SQL Injection Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24693</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1633/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Hewlett Packard Enterprise AutoPass License Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2024-51769.]]></description>
      <pubDate>Mon, 02 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1632: Hewlett Packard Enterprise AutoPass License Server hsqldb Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24692</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1632/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Hewlett Packard Enterprise AutoPass License Server. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.0. The following CVEs are assigned: CVE-2024-51768.]]></description>
      <pubDate>Mon, 02 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1631: Hewlett Packard Enterprise AutoPass License Server Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24691</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1631/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass authentication on affected installations of Hewlett Packard Enterprise AutoPass License Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.3. The following CVEs are assigned: CVE-2024-51767.]]></description>
      <pubDate>Mon, 02 Dec 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1630: (0Day) Fuji Electric Monitouch V-SFT X1 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24548</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1630/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11933.]]></description>
      <pubDate>Wed, 27 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1629: (0Day) Fuji Electric Tellus Lite V-Simulator 5 V8 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24771</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1629/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11803.]]></description>
      <pubDate>Wed, 27 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1628: (0Day) Fuji Electric Tellus Lite V-Simulator 5 V8 File Parsing Stack-Based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24770</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1628/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11802.]]></description>
      <pubDate>Wed, 27 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1627: (0Day) Fuji Electric Tellus Lite V-Simulator 5 V8 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24769</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1627/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11801.]]></description>
      <pubDate>Wed, 27 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1626: (0Day) Fuji Electric Tellus Lite V-Simulator 5 V8 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24768</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1626/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11800.]]></description>
      <pubDate>Wed, 27 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1625: (0Day) Fuji Electric Tellus Lite V-Simulator 5 V8 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24664</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1625/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11799.]]></description>
      <pubDate>Wed, 27 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1624: (0Day) Fuji Electric Monitouch V-SFT X1 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24663</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1624/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11798.]]></description>
      <pubDate>Wed, 27 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1623: (0Day) Fuji Electric Monitouch V-SFT V8 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24662</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1623/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11797.]]></description>
      <pubDate>Wed, 27 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1622: (0Day) Fuji Electric Monitouch V-SFT V9C File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24506</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1622/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11796.]]></description>
      <pubDate>Wed, 27 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1621: (0Day) Fuji Electric Monitouch V-SFT V8 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24505</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1621/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11795.]]></description>
      <pubDate>Wed, 27 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1620: (0Day) Fuji Electric Monitouch V-SFT V10 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24504</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1620/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11794.]]></description>
      <pubDate>Wed, 27 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1619: (0Day) Fuji Electric Monitouch V-SFT V9C File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24503</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1619/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11793.]]></description>
      <pubDate>Wed, 27 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1618: (0Day) Fuji Electric Monitouch V-SFT V8 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24502</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1618/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11792.]]></description>
      <pubDate>Wed, 27 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1617: (0Day) Fuji Electric Monitouch V-SFT V8C File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24450</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1617/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11791.]]></description>
      <pubDate>Wed, 27 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1616: (0Day) Fuji Electric Monitouch V-SFT V10 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24449</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1616/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11790.]]></description>
      <pubDate>Wed, 27 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1615: (0Day) Fuji Electric Monitouch V-SFT V10 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24448</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1615/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11789.]]></description>
      <pubDate>Wed, 27 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1614: (0Day) Fuji Electric Monitouch V-SFT V10 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24413</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1614/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11787.]]></description>
      <pubDate>Wed, 27 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1613: Intel Driver &amp; Support Assistant Log Folder Link Following Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-23927</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1613/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver &amp; Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-36488.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1612: Luxion KeyShot JT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-23826</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1612/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11581.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1611: Luxion KeyShot ABC File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-23700</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1611/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11580.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1610: Luxion KeyShot OBJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-23697</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1610/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11579.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1609: Luxion KeyShot 3DS File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-23693</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1609/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11578.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1608: Luxion KeyShot SKP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-23685</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1608/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11577.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1607: Luxion KeyShot 3DS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-23681</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1607/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11576.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1606: 7-Zip Qcow Handler Infinite Loop Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24307</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1606/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of 7-Zip. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2024-11612.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1605: Adobe InDesign JP2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24608</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1605/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe InDesign. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2024-49529.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1604: IrfanView DXF File Parsing Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22177</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1604/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11507.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1603: IrfanView DXF File Parsing Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22184</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1603/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11508.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1602: IrfanView SVG File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22185</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1602/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11509.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1601: IrfanView ECW File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-23971</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1601/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11513.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1600: IrfanView JPM File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24011</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1600/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11516.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1599: IrfanView ECW File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-23975</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1599/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11514.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1598: IrfanView JPM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24010</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1598/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11515.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1597: IrfanView JPM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24118</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1597/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11517.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1596: IrfanView RLE File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24444</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1596/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11518.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1595: IrfanView RLE File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24445</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1595/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11519.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1594: IrfanView DWG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22169</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1594/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11506.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1593: IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24598</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1593/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11524.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1592: IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24597</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1592/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11523.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1591: IrfanView DXF File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24599</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1591/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11525.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1590: IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24595</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1590/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11522.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1589: IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24602</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1589/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11528.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1588: IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24629</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1588/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11538.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1587: IrfanView DXF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24615</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1587/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11532.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1586: IrfanView DXF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24616</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1586/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11533.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1585: IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24617</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1585/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11534.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1584: IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24618</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1584/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11535.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1583: IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24619</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1583/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11536.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1582: IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24620</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1582/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11537.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1581: IrfanView DWG File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24754</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1581/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11554.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1580: IrfanView ARW File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24488</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1580/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11520.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1579: IrfanView DJVU File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24578</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1579/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11521.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1578: IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24853</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1578/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11560.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1577: IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24857</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1577/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11561.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1576: IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24860</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1576/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11563.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1575: IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24871</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1575/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11567.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1574: IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24873</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1574/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11569.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1573: IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24900</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1573/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11574.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1572: IrfanView CGM File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24858</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1572/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11562.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1571: IrfanView DXF File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24885</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1571/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11570.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1570: IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24897</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1570/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11572.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1569: IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24901</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1569/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11575.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1568: IrfanView DWG File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24864</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1568/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11564.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1567: IrfanView CGM File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24866</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1567/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11565.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1566: IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24895</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1566/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11571.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1565: IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24898</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1565/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11573.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1564: IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24868</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1564/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11566.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1563: IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24872</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1563/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11568.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1562: IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24795</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1562/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11556.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1561: IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24807</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1561/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11557.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1560: IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24808</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1560/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11558.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1559: IrfanView DXF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24780</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1559/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11555.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1558: IrfanView DXF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24809</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1558/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11559.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1557: IrfanView WBZ plugin WB1 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22718</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1557/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11510.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1556: IrfanView XCF Plugin XCF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22735</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1556/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11511.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1555: IrfanView WBZ Plugin WB1 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22741</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1555/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11512.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1554: IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24752</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1554/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11553.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1553: IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24699</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1553/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11539.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1552: IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24702</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1552/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11541.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1551: IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24700</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1551/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11540.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1550: IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24703</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1550/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11542.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1549: IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24749</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1549/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11551.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1548: IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24704</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1548/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11543.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1547: IrfanView DXF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24746</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1547/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11549.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1546: IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24751</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1546/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11552.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1545: IrfanView DWG File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24745</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1545/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11548.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1544: IrfanView DWG File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24732</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1544/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11547.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1543: IrfanView DXF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24714</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1543/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11546.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-24-1542: IrfanView DXF File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24709</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-24-1542/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11545.]]></description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0600</pubDate>
    </item>
    
  </channel>
</rss>
